IIW Book! Come get a REAL IIW attendance verification credential and prove it to your IIW friends using your phone!

From IIW

IIW Book


Tuesday 2A

Convener: John Jordon

Notes-taker(s): Jim Wowchuk & John Jordon


Tags for the session - technology discussed/ideas considered:

VON, Agent Demos


Discussion notes, key understandings, outstanding questions, observations, and, if appropriate to this discussion: action items, next steps:


1. Notes provided by Jim Wowchuck:


Key understanding: a demonstration of an identity authentication, issuing, relying party connection and document/chat exchange using authenticated identities.


Steps were described and followed as per slide 1 (photo attached).


Most of the session was walking through participants through the process and providing ids for delegates.


Discussion followed on about the increasing integration between different agent providers using a set of criteria as discussed on slide 2 (photo attached).


There was continued discussion about a Connectathon last February where 6 different systems were verified as connecting. Evernym was not a system that passed, but this was not held as a lack of ability as much as direction of activities – they had more important features they were working on.


Acceptance that even with non-connecting apps, all family protocols have many of the features but with slightly different protocols.

John Jordon speaking:

IIW28 TU 2A IIWBook(3).jpg

IIW28 TU 2A IIWBook(1).jpg

IIW28 TU 2A IIWBook(2).jpg


2. Link to presentation provided by John Jordon:

http://IIW.vonx.io